How Will Cisco Secure the Non-Human Identity Perimeter?

How Will Cisco Secure the Non-Human Identity Perimeter?

Matilda Bailey is a distinguished networking and security specialist with a career dedicated to the evolution of cellular, wireless, and next-generation architectural solutions. As enterprises undergo a massive shift toward automation, Matilda has become a leading voice on the complexities of machine-to-machine communication and the security implications of autonomous AI agents. With Cisco recently making strategic moves to acquire specialized firms like Astrix Security and Galileo Technologies, the focus has shifted toward the “non-human” perimeter. In this conversation, we explore how organizations can maintain control over a digital landscape where automated identities now vastly outnumber human users.

Non-human identities like API keys and service accounts often outnumber human users by a 100-to-1 ratio. How do these machine-to-machine connections create blind spots in a modern perimeter, and what specific risks emerge when AI agents use these credentials to execute work at scale?

The sheer scale of this 100-to-1 ratio effectively shatters the traditional identity perimeter because most security teams are still using tools designed for human-centric logins. When you have thousands of API keys, service accounts, and OAuth tokens operating in the background, they create a massive, silent attack surface that is rarely audited with the same rigor as a standard employee account. The danger intensifies with AI agents because these entities don’t just sit idle; they use these credentials to autonomously access databases and execute complex workflows across different cloud environments. If an agent is granted excessive privileges, it can inadvertently leak sensitive data or be hijacked to perform malicious actions at machine speed, far faster than a human administrator could ever intervene. It’s a sensory overload for traditional monitoring systems that simply weren’t built to track thousands of simultaneous, high-velocity non-human interactions.

Only about 24% of organizations currently have the guardrails necessary to control agent actions. What are the primary challenges in maintaining visibility from provisioning to decommissioning, and what step-by-step processes should security teams implement to vet policies and prevent compliance violations?

The primary hurdle is that agent capabilities are advancing much faster than the security models meant to govern them, leaving a staggering 76% of organizations vulnerable. Maintaining visibility is difficult because non-human identities are often “set and forget,” meaning they persist in the system long after the project they supported has ended. To fix this, teams must first establish a real-time inventory of every AI agent and MCP server to understand exactly who—or what—is talking to their data. From there, they need to implement a strict lifecycle management process that vets policies for hygiene issues, such as removing redundant tokens and narrowing down excessive permissions to follow the principle of least privilege. Finally, continuous live monitoring is essential to ensure that as an agent evolves, its actions remain within the defined compliance scope, preventing the “drift” that often leads to security breaches.

Effective security often requires integrating identity intelligence with zero-trust access and existing SIEM platforms. How does unifying visibility across these portfolios change the way teams respond to compromised credentials, and what are the practical advantages of investigating agent activity at machine speed?

Unifying these portfolios turns a fragmented mess of alerts into a cohesive story, allowing security teams to see the context behind every automated request. When identity intelligence is piped directly into a SIEM like Splunk or integrated with zero-trust tools like Duo, you move from reactive guessing to proactive defense. This integration allows for the instant detection of compromised credentials because the system can compare real-time agent behavior against a known baseline of legitimate activity. The practical advantage is that you can automate the response—for instance, revoking an OAuth token the millisecond it shows suspicious behavior—which is the only way to counter threats that move at the speed of modern software. Without this unified view, an attacker could hide in the “noise” of service accounts for weeks before being noticed by a human analyst.

Securing the agent development lifecycle involves both real-time observability and identity management. How should organizations distinguish between legitimate automated behavior and out-of-scope agent actions, and what metrics or indicators of compromise are most critical for protecting multi-agent systems?

Distinguishing between a productive AI agent and one that has gone rogue requires a deep level of observability that spans the entire development lifecycle. You have to look for specific indicators of compromise, such as an agent suddenly requesting access to a data repository it has never touched before or a spike in outbound API calls that deviates from established patterns. Organizations should focus on metrics like “privilege utilization”—if an agent has access to 100 tables but only uses three, that’s a red flag for excessive risk. By utilizing platforms like Galileo for real-time monitoring and Astrix for identity governance, teams can set hard guardrails that automatically shut down any action that falls outside the intended business usage. It’s about creating a “digital sandbox” where agents can be productive without the risk of moving laterally through the network if their credentials are ever compromised.

What is your forecast for the future of AI agent security?

My forecast is that we are moving toward a “Zero-Trust for Machines” era where the concept of a “trusted” internal network disappears entirely in favor of continuous, micro-level authentication. As AI agents become the primary workers in our digital infrastructure, we will see a shift where security isn’t just an add-on but is baked into the very fabric of agent orchestration. I expect that within the next few years, the ability to manage non-human identities will become the single most important metric for enterprise resilience, as the 31% of organizations currently feeling capable of securing AI systems today must grow to 100% just to survive. We will eventually see autonomous security agents being deployed to hunt and neutralize rogue task-agents, creating a self-healing environment where security keeps pace with the sheer velocity of AI-driven innovation.

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later